Sciweavers

431 search results - page 51 / 87
» The five orders of ignorance
Sort
View
EDBT
2004
ACM
234views Database» more  EDBT 2004»
15 years 12 months ago
A Condensation Approach to Privacy Preserving Data Mining
In recent years, privacy preserving data mining has become an important problem because of the large amount of personal data which is tracked by many business applications. In many...
Charu C. Aggarwal, Philip S. Yu
VIS
2009
IEEE
430views Visualization» more  VIS 2009»
15 years 9 months ago
Interactive Volume Rendering of Functional Representations in Quantum Chemistry
Simulation and computation in chemistry studies have been improved as computational power has increased over decades. Many types of chemistry simulation results are available, from...
Yun Jang and Ugo Varetto
ICASSP
2009
IEEE
15 years 6 months ago
A Bayesian NETWORKS approach for dialog modeling: The fusion BN
Bayesian Networks, BNs, are suitable for mixed-initiative dialog modeling allowing a more flexible and natural spoken interaction. This solution can be applied to identify the in...
Fernando F. Fernández-Martínez, Javi...
INFOCOM
2009
IEEE
15 years 6 months ago
Medium Access Control for 60 GHz Outdoor Mesh Networks with Highly Directional Links
—We investigate an architecture for multi-Gigabit outdoor mesh networks operating in the unlicensed 60 GHz “millimeter (mm) wave” band. In this band, the use of narrow beams ...
Raghuraman Mudumbai, Sumit Singh, Upamanyu Madhow
PKDD
2009
Springer
88views Data Mining» more  PKDD 2009»
15 years 6 months ago
Feature Weighting Using Margin and Radius Based Error Bound Optimization in SVMs
The Support Vector Machine error bound is a function of the margin and radius. Standard SVM algorithms maximize the margin within a given feature space, therefore the radius is fi...
Huyen Do, Alexandros Kalousis, Melanie Hilario